Salt Typhoon: A Comprehensive Report on the 2025 Cyberattack on U.S. Telecommunications

Salt Typhoon: A Comprehensive Report on the 2025 Cyberattack on U.S. Telecommunications The year 2025 began with a significant cybersecurity breach that has been dubbed the “Salt Typhoon” attack. This large-scale cyber intrusion targeted major telecommunications companies in the United States, exposing critical vulnerabilities in the nation’s communications infrastructure. This report provides an in-depth analysis …

READ MORE

January Patch Tuesday resolves 3 Hyper-V zero-days

January Patch Tuesday: Microsoft Resolves 3 Critical Hyper-V Zero-Day Vulnerabilities Microsoft’s January Patch Tuesday rollout has captured significant attention within thecybersecurity community. The tech giant addressed 100 vulnerabilities across itsproduct ecosystem, including three critical zero-day vulnerabilities affecting Hyper-V,its flagship virtualization platform. This update is particularly critical for organizationsrelying heavily on virtualized environments, as these vulnerabilities …

READ MORE

NSLOOKUP

NSLOOKUP IntroductionHaving access to a website’s Domain Name System (DNS) records is helpful when resolvingDNS issues. Users can use tools found in all popular operating systems to query a web serverand obtain crucial data, like IP addresses and other domain-related details. What is nslookup? A command-line program called nslookup can be used to find the …

READ MORE

What is SQLMAP

SQLMAP SQLmap is a popular, free tool used for penetration testing to detect and exploit SQL injection vulnerabilities in web applications. Since its launch in 2006, it has become a go-to tool for improving web security. SQLmap is an open-source program designed to automatically identify and exploit SQL injection weaknesses. It’s packed with features that, …

READ MORE

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites A new “widespread timing-based vulnerability class” that uses a double-click sequence to enable clickjacking attacks and account takeovers on practically all popular websites has been revealed by threat hunters. DoubleClickjacking is the codename given by security researcher Paulos Yibelo to the technique.“Instead of relying on a …

READ MORE

TRY HACK ME : PHISING EMAILS IN ACTION

TRY HACK ME : PHISING EMAILS IN ACTION Task 1: Introduction Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.  Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, …

READ MORE

TRY Hackme  : Passive reconnaissance

TRY Hackme : Passive reconnaissance Task 1 Introduction Welcome to the first room of the Network Security Module. This module covers: Passive Reconnaissance Active Reconnaissance Nmap Live Host Discovery Nmap Basic Port Scans Nmap Advanced Port Scans Nmap Post Port Scans Protocols and Servers Protocols and Servers 2 Network Security Challenge In this room, after …

READ MORE

DPDP Act 2023 V/S DPDP Act 2025

Digital Personal Data Protection It appears that you want to know how the DPDP (Data Protection and Digital Privacy) rules and regulations of 2023 and 2025 differ from one another. Here’s an explanation if you’re talking about the Digital Personal Data Protection (DPDP) Act, 2023 in India or a comparable data protection framework: Digital Personal …

READ MORE